Featured Blog
Securing the Email Flow: Implementing Encrypted Email in Microsoft 365, Exchange, and Onward
Most information security and IT teams know the risks involved when sending unencrypted email. However, outside of those groups, it is still not clear to many email users why encrypting sensitive email messages is so important and the extent of risks associated with unencrypted email communications. Encrypted email adoption still remains low across many industries. […]
Ransomware, Tabletop Exercises
How a Ransomware Tabletop Exercise Can Dramatically Reduce Your Losses If You’re Attacked
Cyberattacks, Pen Testing
A Real-World Cyber Attack Simulation: How a Hacker Can Breach Your Organization in One Weekend
Compliance, Health care
Understanding the Proposed HIPAA Security Rule Updates & Why You Should Take Action Now
Cybersecurity, Cybersecurity Planning